Cyber Resilience RESILIA Foundation Training Course
The RESILIA course begins by exploring its core purpose, essential terminology, the differentiation between resilience and security, and the advantages of adopting cyber resilience. It provides an introduction to risk management and outlines the critical activities required to manage risks and capitalize on opportunities. Additionally, it highlights the importance of widely recognized management standards and best practice frameworks in achieving cyber resilience. The course then details the cyber resilience processes, including associated control objectives, interactions, and activities that should align with relevant ITSM processes. In the final section, it covers the segregation of duties and dual controls pertinent to cyber resilience roles and responsibilities.
This course is available as onsite live training in Romania or online live training.Course Outline
- Design and implement cyber resilient strategies and services throughout your organization, tailored to business requirements
- Incorporate cyber resilience into existing systems and operational processes
- Develop a shared vocabulary for cyber resilience across your organization
- Reduce the impact of security incidents and facilitate rapid response and recovery
Requirements
- Fundamental knowledge of organizational structures and employee roles
- Basic understanding of cybersecurity principles
- It is advisable to complete the ITIL Foundation course prior to this one
Open Training Courses require 5+ participants.
Cyber Resilience RESILIA Foundation Training Course - Booking
Cyber Resilience RESILIA Foundation Training Course - Enquiry
Cyber Resilience RESILIA Foundation - Consultancy Enquiry
Testimonials (2)
Being approachable and pushing us into interaction
Daniel - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CISSP - Certified Information Systems Security Professional
Overview of Risk topics and preparing for exam
Leszek - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - CRISC - Certified in Risk and Information Systems Control
Upcoming Courses
Related Courses
Business Continuity Practitioner
14 HoursThis course is designed to assist attendees in building organizational resilience against various threats, enabling organizations to respond effectively to incidents, maintain business operations availability, and safeguard their interests.
CISA - Certified Information Systems Auditor
28 HoursDescription:
CISA® stands as the world's most renowned and widely recognized certification for professionals specializing in IS audit and IT risk consulting.
Our CISA course offers intensive, highly competitive, and exam-oriented training. Drawing on our experience of delivering over 150 CISA training programs across Europe and globally, and having trained more than 1,200 delegates, Net Security’s in-house CISA training materials are designed with the primary objective of ensuring delegates pass the ISACA CISA® Exam. The methodology emphasizes a deep understanding of CISA IS auditing concepts through rigorous practice with extensive question banks released by ISACA over the past three years. Over time, CISA holders have become highly sought after by prestigious accounting firms, global banks, advisory and assurance divisions, and internal audit departments.
While delegates may possess years of IT auditing experience, their ability to solve CISA questionnaires depends entirely on their grasp of globally accepted IT assurance practices. The CISA exam is notably challenging because it often presents closely matched potential answers, testing the candidate's nuanced understanding of global IT auditing standards. To help navigate these challenges, we consistently provide expert trainers with extensive global experience in delivering CISA training.
The Net Security CISA manual encompasses all exam-relevant concepts, case studies, and Q&A sessions across the five CISA domains. Additionally, trainers provide key supporting materials during the course, including detailed CISA notes, question banks, glossaries, videos, revision guides, exam tips, and CISA mind maps.
Goal:
The primary objective is to help you pass the CISA examination on your first attempt.
Objectives:
- Apply acquired knowledge in a practical manner that benefits your organization.
- Deliver audit services in compliance with IT audit standards.
- Provide assurance regarding leadership, organizational structure, and processes.
- Provide assurance on the acquisition, development, testing, and implementation of IT assets.
- Provide assurance on IT operations, including service operations and third-party management.
- Provide assurance that the organization’s security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.
Target Audience:
Finance/CPA professionals, IT professionals, internal and external auditors, information security specialists, and risk consulting professionals.
CISA - Certified Information Systems Auditor - Exam Preparation
28 Hours
This training is structured as an interactive workshop enriched with comprehensive theoretical knowledge. The curriculum aligns with the official CISA certification framework. Throughout the sessions, we will analyze case studies to address specific challenges. Instruction is conducted in English (Polish is available upon request) using the ISACA handbook as the primary resource.
Scope of CISA Exam Material:
- Information System Auditing Process (21%)
- Governance and Management of IT (17%)
- Information Systems Acquisition, Development and implementation (12%)
- Information Systems Operation and Business Resilience (23%)
- Protection of Information Assets (27%)
Exam Duration: 4 hours
Format: Multiple choice test
Number of Questions: 200
To qualify for the CISA certification, you must fulfill the following requirements:
- Pass the CISA exam with a score of 450 or higher.
- Adhere to the ISACA Code of Professional Ethics
- Commit to complying with the CISA Continuing Professional Education Policy
- Accumulate at least 5 years of professional experience in information systems auditing, control, or security.
- Comply with Information Systems Auditing Standards
Once you have passed the exam and confirmed that you meet these criteria, you may submit your certification application via the official ISACA certification page.
A processing fee of $50 is required for the application.
Additionally, there is an annual renewal fee to maintain your certification. The cost is $40 per year for ISACA members and $75 for non-members.
CISSP Certification Preparation: Mastering the Eight Domains
35 HoursThe Certified Information Systems Security Professional (CISSP) credential, issued by (ISC)², is a globally respected certification for senior information security experts. It demonstrates proficiency across eight distinct security domains and enhances professional credibility for positions such as Chief Information Security Officer (CISO), security engineer, and senior security manager.
This instructor-led, live training (available online or onsite) is designed for intermediate to advanced security practitioners seeking to achieve both conceptual depth and practical readiness for passing the CISSP exam on the first attempt, while effectively applying these principles in real-world organizational settings.
Upon completion of this training, participants will be able to:
- Comprehend and implement the eight CISSP domains within the context of security governance and operational practice.
- Create, evaluate, and fortify organizational security policies, architectures, and controls.
- Design and deploy security solutions that align with legal requirements, compliance standards, and business goals.
- Approach and answer exam-style CISSP questions with confidence and strategic insight.
Course Format
- Lectures and guided walkthroughs of each domain.
- Practice questions, scenario-based discussions, and quizzes.
- Hands-on labs, case studies, and collaborative group exercises.
Customization Options
- To arrange customized domain focus areas or extended exam review sessions, please contact us.
Cloudflare Essentials: CDN, Security, and DDoS Mitigation
14 HoursThis instructor-led, live training in Romania (online or on-site) is aimed at beginner to intermediate-level system administrators and security professionals who wish to learn how to implement Cloudflare for content delivery and cloud security, as well as mitigate DDoS attacks.
By the end of this training, participants will be able to:
- Configure Cloudflare for their websites.
- Set up DNS records and SSL certificates.
- Implement Cloudflare for content delivery and caching.
- Protect their websites from DDoS attacks.
- Implement firewall rules to restrict traffic to their websites.
CRISC - Certified in Risk and Information Systems Control
21 HoursDescription:
This course is designed as an intensive and rigorous preparation for ISACA’s Certified Information Systems Auditor (CRISC) Examination. It covers the four (4) most recent domains of the ISACA CRISC syllabus, with a strong emphasis on exam success. Participants will receive the Official ISACA CRISC Review Manual and the Question, Answer and Explanation (Q,A&E) supplements. The Q,A&E resource is invaluable for helping students grasp the style of ISACA questions, understand the types of answers sought, and facilitate rapid retention of the material.
The technical skills and practices promoted and evaluated by ISACA within the CRISC certification form the foundation of success in this field. Holding the CRISC certification demonstrates your professional competence. With increasing demand for professionals skilled in risk and control, ISACA’s CRISC has established itself as the preferred certification for individuals and organizations worldwide. The CRISC certification reflects a dedication to serving your enterprise and profession with excellence.
Objectives:
- Help you pass the CRISC examination on your first attempt.
- Signify your commitment to serving an enterprise with distinction.
- Leverage the growing demand for professionals with risk and control skills to secure better positions and salaries.
You will learn:
- How to help enterprises achieve their business objectives by designing, implementing, monitoring, and maintaining risk-based, efficient, and effective IS controls.
- The technical skills and practices promoted by CRISC, which are the building blocks of success in the field.
CRISC - Certified in Risk and Information Systems Control - 4 Days
28 HoursThis instructor-led, live training in Romania (online or onsite) is designed for intermediate-level IT professionals who wish to enhance their skills in identifying and managing IT risk, implementing information systems controls, and preparing for the CRISC certification exam.
Upon completing this training, participants will be able to:
- Grasp the governance and risk management dimensions of IT.
- Perform IT risk assessments and execute appropriate risk responses.
- Design and deploy information systems controls.
- Effectively prepare for the CRISC certification exam.
Managing Cyber Risks in the Supply Chain
7 HoursThis instructor-led, live training in Romania (online or onsite) is designed for supply chain professionals seeking to establish robust control and oversight over their supply chains, with a particular focus on cybersecurity.
By the conclusion of this training, participants will be able to:
- Identify security oversights that can cause significant damage and disruption to supply chain operations.
- Deconstruct complex security challenges into manageable and actionable components.
- Address common supply chain vulnerabilities by analyzing high-risk areas and engaging with stakeholders.
- Implement best practices for securing the supply chain.
- Significantly reduce or eliminate the most critical risks facing an organization's supply chain.
Data Breach Management
14 HoursThis instructor-led, live training in Romania (online or onsite) is designed for intermediate to advanced IT professionals and business leaders seeking to develop a structured approach to managing data breaches.
Upon completion of this training, participants will be capable of:
- Understanding the causes and consequences of data breaches.
- Developing and implementing strategies to prevent data breaches.
- Establishing an incident response plan to contain and mitigate breaches.
- Conducting forensic investigations and assessing the impact of breaches.
- Complying with legal and regulatory requirements for breach notification.
- Recovering from data breaches and strengthening security postures.
HiTrust Common Security Framework Compliance
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at developers and administrators who wish to produce software and products that are HiTRUST compliant.
By the end of this training, participants will be able to:
- Understand the key concepts of the HiTrust CSF (Common Security Framework).
- Identify the HITRUST CSF administrative and security control domains.
- Learn about the different types of HiTrust assessments and scoring.
- Understand the certification process and requirements for HiTrust compliance.
- Know the best practices and tips for adopting the HiTrust approach.
PECB ISO 27005 Risk Manager
21 HoursThis training course demonstrates how risk assessment for information security is conducted by integrating information from ISO/IEC 27005:2022 and ISO/IEC 27001. Beyond theoretical knowledge, the course includes practical exercises, quizzes, and case studies, making it a highly engaging learning experience.
Business Continuity Management
35 HoursDescription:
This 'Practitioner'-level course is heavily focused on hands-on exercises aimed at reinforcing key concepts and boosting delegates' confidence in executing business continuity management strategies. It also fosters an environment for debate, allowing students to exchange knowledge and professional experiences.
Participants will gain valuable insights from our trainers' extensive practical expertise in business continuity management and their specialization in ISO 22301:2019.
Learning Objectives:
- Articulate the necessity of business continuity management (BCM) for all organizations
- Define the business continuity lifecycle
- Manage the business continuity programme effectively
- Gain a comprehensive understanding of their organization to pinpoint mission-critical areas
- Develop the organization's business continuity strategy
- Establish an effective business continuity response
- Exercise, maintain, and review continuity plans
- Integrate business continuity culture within the organization
- Define terminology specific to business continuity
Upon completion of the course, delegates will possess a thorough understanding of all essential components of business continuity management, enabling them to return to their roles and significantly enhance the organization's business continuity management process.
IBM Qradar SIEM: Beginner to Advanced
14 HoursThis instructor-led, live training in Romania (online or onsite) is aimed at security engineers who wish to use IBM Qradar SIEM to address pressing security use cases.
By the end of this training, participants will be able to:
- Gain visibility into enterprise data across on-premise and cloud environments.
- Automate security intelligence to hunt threats and to contain risks.
- Detect, identify, and prioritize threats.
Snyk
14 HoursThis instructor-led live training, held in Romania (online or onsite), is designed for developers aiming to integrate Snyk into their development tools to identify and resolve code security issues.
By the end of this training, participants will be able to:
- Understand the features and structure of Snyk.
- Use Snyk to find and fix code security issues.
- Integrate Snyk in a software development lifecycle.
Understanding Modern Information Communication Technology
7 HoursThis course explores fundamental principles of general security and IT security, focusing heavily on strategies to defend against network-based attacks. Participants will develop a solid grasp of critical security protocols and the underlying security concepts that govern web services. Throughout practical laboratory sessions and threat modeling exercises, the curriculum will reference recent attacks targeting cryptosystems and highlight associated vulnerabilities.